Cover image of Government Information Security Podcast
(8)
Government & Organizations
National

Government Information Security Podcast

Updated 13 days ago

Government & Organizations
National
Read more

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Read more

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

iTunes Ratings

8 Ratings
Average Ratings
6
1
0
0
1

Required Listening

By Pocono Charlie - Aug 25 2017
Read more
Required listening for any in gov't cybersecurity.

iTunes Ratings

8 Ratings
Average Ratings
6
1
0
0
1

Required Listening

By Pocono Charlie - Aug 25 2017
Read more
Required listening for any in gov't cybersecurity.
Cover image of Government Information Security Podcast

Government Information Security Podcast

Updated 13 days ago

Read more

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Rank #1: Blockchain in Healthcare: The Potential Benefits, Risks

Podcast cover
Read more
Indiana University Health is evaluating the use of blockchain in two areas to improve healthcare information security, Mitch Parker, CISO, says in an interview at the HIMSS19 conference. He sizes up the potential risks and benefits.
Feb 14 2019
Play

Rank #2: Identity as a Game-Changing Breach Defense

Podcast cover
Read more
Often in breach response, security professionals focus on the technical aspects of the attack. Yet, the non-technical aspects are often more insidious, says Teju Shyamsundar of Okta. And Identity can be a powerful tool to bolster defenses.
Jun 25 2019
Play

Rank #3: Third-Party Risk Management: Asking the Right Questions

Podcast cover
Read more
An effective third-party risk management program starts with asking the right questions, says Brad Keller, chief strategy officer and senior vice president at the Santa Fe Group, a strategic advisory company, who spells out key issues to address.
Jun 28 2019
Play

Rank #4: Mastercard on the Evolution of Authentication

Podcast cover
Read more
Fraud schemes have migrated in recent years, exposing inherent vulnerabilities in how most organizations authenticate users. Diego Szteinhendler of Mastercard outlines new strategies and tools for evolving authentication practices beyond solely payments security.
Jun 28 2019
Play

Rank #5: Threat Intelligence: Why Sharing Is Difficult

Podcast cover
Read more
Cyber adversaries are resilient and move quickly, so it'st critical that organizations share threat intelligence in an automated way, says Shawn Henry of CrowdStrike Services. But that sharing has been hampered by a lack of understanding of why it's important and how organizations can benefit, he says.
Jul 09 2019
Play

Rank #6: Life Beyond Passwords: The Rise of Advanced Biometrics

Podcast cover
Read more
Biometrics may be in fashion, but it's in part because users are ready, willing and able to use it to prove their identity, thanks to Apple, Samsung, Google and other players providing trustable hardware for verifying people's fingerprints and faces, says IBM Security's Neil Warburton.
Jul 05 2019
Play

Rank #7: The Challenges of Implementing Next-Generation IAM

Podcast cover
Read more
Identity and access management is more complicated when organizations rely on a cloud infrastructure, says Brandon Swafford, CISO at Waterbury, Connecticut-based Webster Bank, who describes the challenges in an interview.
Mar 04 2019
Play

Rank #8: HIPAA Enforcement Update: Areas of Focus

Podcast cover
Read more
The HHS Office for Civil Rights is paying particular attention to complaints involving patients' access to their health information; it's also focusing on investigations of organizations with patterns of HIPAA noncompliance, Nick Heesters of the agency explains in an interview at the HIMSS19 conference.
Feb 12 2019
Play

Rank #9: Information Blocking Rules: What They Would Mean for CISOs

Podcast cover
Read more
Healthcare CISOs and other security and privacy leaders must carefully assess HHS' proposed new rules designed to help prevent the blocking of health information sharing and consider how they might "operationalize" the provisions within their organizations, says attorney Jodi Daniel.
Feb 22 2019
Play

Rank #10: Bridging the Cybersecurity Skills Gap

Podcast cover
Read more
The latest edition of the ISMG Security Report features Greg Touhill, the United States' first federal CISO, discussing how "reskilling" can help fill cybersecurity job vacancies. Plus, California considers tougher breach notification requirements; curtailing the use of vulnerable mobile networks.
Mar 01 2019
Play

Rank #11: Deciphering HHS' Proposed Information Blocking Rules

Podcast cover
Read more
Proposed rules released this week by the Department of Health and Human Services aim to define and discourage inappropriate blocking of the secure sharing of health information, Elise Sweeney Anthony of the Office of the National Coordinator for Health IT explains in an interview at the HIMSS19 conference.
Feb 13 2019
Play

Rank #12: Analysis: The Capital One Breach

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the root causes of the Capital One data breach. Also featured: breach remediation advice and compliance with New York's new third-party risk management requirements.
Aug 02 2019
Play

Rank #13: Evolving to a Zero-Trust Architecture

Podcast cover
Read more
Taking a zero-trust approach can help organizations unshackle themselves from the password and drastically reduce the attack surface, says Akamai's Fernando Serto.
Jul 26 2019
Play

Rank #14: 2.3 Billion Files Exposed Online: The Root Causes

Podcast cover
Read more
Misconfigured file storage technologies and a lack of basic security controls are the root causes for the inadvertent online exposure of 2.3 billion files worldwide that contain personal information, including sensitive medical data, says Harrison Van Riper, a security researcher at Digital Shadows.
Jul 22 2019
Play

Rank #15: Will Cyberattacks Lead to Prolonged Conflicts?

Podcast cover
Read more
There's good news and bad news about the current state of cybersecurity, according to Richard A. Clarke and Robert K. Knake, two former federal advisers who have written a new book. Learn about their concerns that cyberattacks could escalate into prolonged conflicts.
Jul 16 2019
Play

Rank #16: Analysis: The Significance of GDPR Fines

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the significance of fines against British Airways and Marriott for violations of the EU's GDPR. Also featured are discussions of California's privacy law as a model for other states and the next generation of deception technologies.
Jul 12 2019
Play

Rank #17: Migrating to the Cloud: Top Security Lessons

Podcast cover
Read more
When migrating systems, data and applications to the cloud, a critical security step is to involve compliance auditors in the process as early as possible, says Thien La, CISO at Wellmark Blue Cross Blue Shield.
Jun 21 2019
Play

Rank #18: Lack of Secure Coding Called a National Security Threat

Podcast cover
Read more
The lack of secure coding is a pervasive and serious threat to national security, according to a new paper from the Institute for Critical Infrastructure Technology. In an interview, Rob Roy, co-author of the report, outlines what steps should be taken to encourage or enforce secure coding practices.
May 20 2019
Play

Rank #19: WhatsApp's Spyware Problem

Podcast cover
Read more
The latest edition of the ISMG Security Report digs into the WhatsApp flaw that paved the way for spyware installation. Also: Microsoft patches old operating systems and a 'virtual CISO' sizes up security challenges.
May 17 2019
Play

Rank #20: WhatsApp Exploit Reveals 'Legalized Hacking' at Work

Podcast cover
Read more
Attackers exploiting a buffer overflow in WhatsApp's signaling software to automatically infect devices with malware - without users even having to answer their phone - and then alter call logs to hide attack traces is "a bit of a nightmare scenario," says cybersecurity expert Alan Woodward.
May 14 2019
Play

Similar Podcasts